Role-Based Access Control
Finding Differences in Privilege Protection and their Origin in Role-Based Access Control Implementations
206
Protecting sensitive data using differential privacy and role-based access control
102
Context-Aware Access Control for RDF Graph Stores
7
The case for Access Control on XML relationships
24
Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics
13
Authentication and access control based on distributed ledger technology
9
Model-Based Tests for Access Control Policies
11
Reputation trust mechanism under the organizational-based access control model
17
An Access Control Model for Web Databases
9
A new scalable authentication and access control mechanism for 5G-based IoT
34
Ontology-Based Access Rights Management
14
JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
17
XPACML eXtensible Privacy Access Control Markup Language
6
Verifying Resource Access Control on Mobile Interactive Devices
26
Access Control for HTTP Operations on Linked Data
16
Database access control within a Java application
8
A Social Semantic Web Access Control Model
13
On the isofunctionality of network access control lists
7
Access control in IoT environments: Feasible scenarios
7
Automatic Error Finding in Access-Control Policies
14